What is Computer Security?
Computer Security: refers to the measures taken to protect a computer's hardware and software from
unauthorized access or damage.
Cybersecurity: The practice of protecting systems, networks, and programs from digital attacks. Eg.
hacking, Ransomware, Spyware etc.
Elements of Computer Security
-Vulnerability: A weakness in a system that can be exploited.
- Threat: Any potential danger to information or systems.
- Attack: An attempt to exploit a vulnerability.
- Countermeasure: Actions taken to prevent or mitigate attacks.
Computer Misuse
Misuse is the use of computers to do harmful acts. Examples are:
Cyber bullying: involves using digital platforms/websites to harass, threaten, or embarrass someone.
Copyright infringement: occurs when someone uses copyrighted material without permission
Data theft: is the unauthorized access and retrieval of sensitive information.
Denial of service attacks: overwhelms a system, making it unavailable to users
Viruses and malware: are harmful software that can damage computers and networks.
Identity theft: the unauthorized taking of sensitive information.
Phishing attacks: tricking individuals into providing personal info through fake emails or websites.
Software and music piracy: illegal copying and distribution of software and music
Financial abuses: fraudulent activities that exploit financial systems for personal gain.
Violation of privacy: This occurs when personal information is accessed without consent.
Electronic eavesdropping: unauthorized listening to private communications.
Industrial espionage: Companies spying on each other
Who is affected bv Computer Misuse and how are they affected?
-Individuals: (1) Cyber bullying can lead to emotional distress.
(2) Identity theft can lead to financial loss.
-Organizations:(1)Data theft can compromise sensitive information.
(2)Denial of service attacks can disrupt business operations .
-Governments: (1)Cyber attacks can threaten national security.
(2)Electronic eavesdropping can violate citizens' rights.
Countermeasures to reduce Threats
There are two categories of Counter measure Physical and Software.
Physical Measures:
- Backup/Recovery:Save data in case of a loss by keeping a copy of the data in a another location.
- Intrusion Detection Systems: Monitor network traffic for suspicious activity.
- Biometrics: Use body parts like fingerprint or Iris to grant access to system.
- Software Measures:
- Effective Passwords Strong passwords (use of symbols and numbers in password
-Two Factor Authentication: Requires two forms of IDs eg. Enter password and code
- Encryption of Data:Encryption protects data by converting it into a code.
- Antivirus and Malware Detection:Protect systems from malicious software.
Other Practices include:
verifying authenticity of email from companies or individuals,
checking website URLs for authenticity,
limiting access to open Wi-Fi networks, securing mobile devices,
Graded Activity
Below is a list of cybersecurity and countermeasures.Classify each as either Physical
or Software-Related by placing them in the correct category.
1. Firewall ______________________________
2. Security Cameras ______________________________
3. Biometric Access Control ______________________________
4. Intrusion Detection System (IDS) ______________________________
5. Data Encryption ______________________________
6. Server Room Locks ______________________________
7. Antivirus Software ______________________________
8. Multi-Factor Authentication (MFA) ______________________________
9. Regular Software Updates ______________________________
10. Employee ID Badge Access _____________________________
11. Secure Network Configuration ______________________________